A vulnerability in the Rate Limiting Network Address Translation (NAT) feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause high CPU utilization in the Cisco QuantumFlow Processor of an affected device, resulting in a denial of service (DoS) condition. This vulnerability is due to mishandling of the rate limiting feature within the QuantumFlow Processor. An attacker could exploit this vulnerability by sending large amounts of traffic that would be subject to NAT and rate limiting through an affected device. A successful exploit could allow the attacker to cause the QuantumFlow Processor utilization to reach 100 percent on the affected device, resulting in a DoS condition.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ratenat-pYVLA7wM | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2021-09-22 20:15
Updated : 2021-10-05 12:26
NVD link : CVE-2021-1624
Mitre link : CVE-2021-1624
JSON object : View
CWE
CWE-400
Uncontrolled Resource Consumption
Products Affected
cisco
- asr_1009-x
- asr_1000-x
- asr_1001-x_r
- asr_1002-x_r
- asr_1002-hx_r
- asr_1023
- asr_1002
- asr_1002-hx
- asr_1000-esp100
- asr_1006-x
- asr_1001-hx
- ios_xe
- asr_1013
- asr_1006
- asr_1001-hx_r
- asr_1001-x
- asr_1004
- asr_1000
- asr_1002-x
- asr_1001